Multi-user searchable encryption system and method with index validation and tracing

a searchable encryption and multi-user technology, applied in the field of multi-user searchable encryption technique, can solve the problems of inability to reliably store information using external database services, inability to efficiently manage such data, and increased costs

Inactive Publication Date: 2013-06-13
ELECTRONICS & TELECOMM RES INST
View PDF6 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Recently, as the information society has been advanced, the amount of data processed by individuals, business, and the like has been increased, and thus, costs required for efficiently managing such data have also been considerably increased.
However, it is not in reason to impose costs required for such information management on every member of the information society, and thus, cases of storing information by utilizing an external database service has been gradually increased.
However, the utilization of an external database has an arising problem that an external database is not reliable as can be seen from a case of a data spill or the like which is frequently generated recently, so a proposal of a solution thereto has emerged as a very critical issue.
That is, it means that, although an external attacker or a database manager obtains stored encrypted data, it cannot obtain actually meaningful information.
The biggest issue in the cloud computing is to guarantee confidentiality of data concentrated on the cloud server, which essentially requires an application of a searchable encryption system.
However, it is difficult to effectively protect data utilized in a multi-user computing environment represented by cloud computing only with the existing symmetric key or public key-based searchable encryption systems.
When multiple users share data through a database, the most critical issue is to authenticate data stored in the database.
However, the multi-user searchable encryption system developed to date does not take such a data verification and tracing function into consideration.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-user searchable encryption system and method with index validation and tracing
  • Multi-user searchable encryption system and method with index validation and tracing
  • Multi-user searchable encryption system and method with index validation and tracing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024]Hereinafter, embodiments of the present invention will be described in detail with the accompanying drawings. FIG. 1 is a view illustrating an operation flow in a multi-user searchable encryption system in accordance with an embodiment of the present invention.

[0025]Referring to FIG. 1, the multi-user searchable encryption system includes a key generation center (KGC) 200, a database (DB) server 202, and a user terminal device 204 used by multiple users u1, up2, . . . , un.

[0026]The key generation center 200 issues a private secret key to a user, and identifier regarding a user who has generated an index. When there is a problem with the index generated by the user terminal device 204, the key generation center 200 checks identifier of the user terminal device 204 by using the master secret key thereof to trace the user who has generated the index. Further, the key generation center 200 issues a system parameter and a public key for verifying an index before issuing the privat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A multi-user searchable encryption system includes a key generation center to issue a private secret key to a user and trace information regarding a user who has generated an index, and a user terminal device to generate an index for searching for a database using the private secret key. The multi-user searchable encryption system includes a database (DB) server that verifies the index generated by the user terminal device and searches for corresponding data to the verified index.

Description

RELATED APPLICATION(S)[0001]This application claims the benefit of Korean Patent Application No. 10-2011-0132068, filed on Dec. 9, 2011, which is hereby incorporated by reference as if fully set forth herein.FIELD OF THE INVENTION[0002]The present invention relates to a multi-user searchable encryption technique, and more particularly, to a searchable encryption method and system which are capable of verifying an index generated by each user and tracing a user who has generated an index in a database used by multiple users.BACKGROUND OF THE INVENTION[0003]Recently, as the information society has been advanced, the amount of data processed by individuals, business, and the like has been increased, and thus, costs required for efficiently managing such data have also been considerably increased. However, it is not in reason to impose costs required for such information management on every member of the information society, and thus, cases of storing information by utilizing an externa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/08
CPCH04L9/3073H04L9/0861G06F21/60H04L9/00
Inventor JHO, NAM-SUCHANG, KU YOUNGHONG, DO WON
Owner ELECTRONICS & TELECOMM RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products